Ellos mismos lo dicen:
Lógicamente, todas las pruebas se han realizado en un laboratorio con aviones virtuales ya que además de su ilegalidad y de su peligro en un avión real, la aplicación no serviría en un sistema comercial, pero aún así es preocupante ya que los métodos de conexión y comunicación son los mismos que se utilizan en el mundo real.Básicamente lo que ha conseguido es emular los métodos de conexión usando el mismo protocolo de comunicación y vulnerar un ""juguete" que se ha hecho el mismo. Nada que ver con un sistema comercial.
De hecho leyendo la fuente original, deja todavia más dudas:
One of the two technologies he abused is the Automatic Dependent Surveillance-Broadcast (ADS-B), which sends information about each aircraft (identification, current position, altitude, and so on) through an on-board transmitter to air traffic controllers
The other one is the Aircraft Communications Addressing and Reporting System (ACARS), which is used to exchange messages between aircraft and air traffic controllers via radio or satellite, as well as to automatically deliver information about each flight phase to the latter.
Both of these technologies are massively insecure and are susceptible to a number of passive and active attacks. Teso misused the ADS-B to select targets, and the ACARS to gather information about the onboard computer as well as to exploit its vulnerabilities by delivering spoofed malicious messages that affect the “behavior” of the plane.
Es decir, solo se ha conseguido obtener información sobre un vuelo y ser capaz de enviar paquetes los cuales no se ha demostrado que puedan hacer nada a un sistema comercial.
Y aquí el resultado:
https://www.helpnetsecurity.com/2013/04/15/faa-and-easa-say-hijacking-planes-using-an-app-is-not-possible/The Federal Aviation Administration has stated that it “is aware that a German information technology consultant has alleged he has detected a security issue with the Honeywell NZ-2000 Flight Management System (FMS) using only a desktop computer. The FAA has determined that the hacking technique described during a recent computer security conference does not pose a flight safety concern because it does not work on certified flight hardware. The described technique cannot engage or control the aircraft’s autopilot system using the FMS or prevent a pilot from overriding the autopilot. Therefore, a hacker cannot obtain ‘full control of an aircraft’ as the technology consultant has claimed.”
Saludos